Skip to main content
Log in

Technology Regulation Policy for Business Ethics: An Example of RFID in Supply Chain Management

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

With the increase in use of a technology, its misuse possibility also increases in general. Moreover, there are instances where new technologies are implemented without thoroughly testing for vulnerabilities. We consider RFID, a disruptive technology, and related vulnerabilities in existing supply chain applications from an ethics perspective. We develop an extended ethics model to incorporate the effects of emerging information and communication technologies, specifically that of RFID systems, including technology selection, social consequences, and practitioners’ rationality. We introduce a set of matrices for technology regulation development based on this model to serve as a communication tool for the policy maker for policy design regulation. We use the case of RFID to illustrate the model and matrices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Bommer, M., Gratto, C., Gravander, J., & Tuttle, M. (1987). A behavioral model of ethical and unethical decision making. Journal of Business Ethics, 6, 265–280.

    Article  Google Scholar 

  • Boynton, A. C., Zmud, R. W., & Jacobs, G. (1994). The influence of IT management practice on IT use in large organizations. MIS Quarterly, 18(3), 299–318.

    Article  Google Scholar 

  • Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51(3), 301–312.

    Article  Google Scholar 

  • Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. Crime and Justice, 4, 225–256.

    Article  Google Scholar 

  • Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19, 91–150.

    Article  Google Scholar 

  • De George, R. T. (2000). Business ethics and the challenge of the information age. Business Ethics Quarterly, 10(1), 63–72.

    Article  Google Scholar 

  • Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy & Marketing, 12(1), 106–119.

    Google Scholar 

  • Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. The Academy of Management Review, 16(2), 366–395.

    Google Scholar 

  • Kaler, J. (1999). What’s the good of ethical theory? Business Ethics: A European Review, 8(4), 206–213.

    Article  Google Scholar 

  • Khazanchi, D. (1995). Unethical behavior in information systems: The gender factor. Journal of Business Ethics, 14(9), 741–749.

    Article  Google Scholar 

  • Laudon, K. C. (1995). Ethical concepts and information technology. Communications of The ACM, 38(12), 33–39.

    Google Scholar 

  • Lee, H., Padmanabhan, P., & Whang, S. (1997). Information distortion in a supply chain. Management Science, 43(4), 546–558.

    Google Scholar 

  • Levi, M. (1988). The prevention of fraud. Crime Prevention Unit Paper 17, London: Home Office.

  • Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A. S. (2010). Classifying RFID attacks and defenses. Information Systems Frontier, 12, 491–505.

    Article  Google Scholar 

  • Moir, L. (2001). What do we mean by corporate social responsibility? Corporate Governance, 1(2), 16–22.

    Google Scholar 

  • Murphy, P. E. (1988). Implementing business ethics. Journal of Business Ethics, 7(12), 907–915.

    Google Scholar 

  • Nolan, R., & McFarlan, F. W. (2005). Information technology and the board of directors. Harvard Business Review, 83(10), 96–106.

    Google Scholar 

  • Payne, D., & Dimanche, F. (1996). Towards a code of conduct for the tourism industry: An ethics model. Journal of Business Ethical Standards, 15(9), 997–1007.

    Google Scholar 

  • Trevino, L. K. (1986). Ethical decision making in organizations: A person–situation interactionist model. The Academy of Management Review, 11(3), 601–617.

    Google Scholar 

  • Weaver, G. R. (1993). Corporate codes of ethics: Purpose, process and content issues. Business and Society, 32, 44–58.

    Google Scholar 

  • Welsh, B. C., & Farrington, D. P. (2000). Costs and benefits of crime prevention programs. Crime and Justice, 27, 305–361.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Selwyn Piramuthu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhou, W., Piramuthu, S. Technology Regulation Policy for Business Ethics: An Example of RFID in Supply Chain Management. J Bus Ethics 116, 327–340 (2013). https://doi.org/10.1007/s10551-012-1474-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-012-1474-4

Keywords

Navigation